This repository showcases hands-on cybersecurity labs and real-world attack simulations performed in controlled environments.
- Active Directory Security & Attacks
- Incident Response & Log Analysis
- Network Traffic Analysis (Wireshark, TCPDump)
- Vulnerability Scanning (Nessus, OpenVAS)
- Web Application Security Testing (OWASP Top 10)
- Phishing Analysis
Operating Systems:
- Windows Server
- Kali Linux
Security Tools:
- Wireshark
- Burp Suite
- Nessus / OpenVAS
- BloodHound
- Mimikatz
- Impacket
SIEM & Logging:
- Splunk / ELK Stack
Scripting:
- PowerShell
- Bash
Simulating real-world Active Directory attacks including privilege escalation and credential abuse.
➡️ View Project
Investigating security events using logs and identifying malicious activity.
➡️ View Project
Analyzing packet captures to detect suspicious behavior.
➡️ View Project
Identifying and analyzing vulnerabilities using scanning tools.
➡️ View Project
Testing applications against OWASP Top 10 vulnerabilities.
➡️ View Project
Investigating real-world email threats including phishing and business email compromise (BEC), using header analysis, domain validation, and threat intelligence tools to identify indicators of compromise and assess risk.
➡️ View Project
To demonstrate practical, job-ready cybersecurity skills through hands-on labs and documented attack scenarios.
- Focus on both offensive (attacks) and defensive (detection & mitigation) techniques
- Includes real-world attack simulations in controlled lab environments
- Emphasis on log analysis and detection strategies
- Detailed documentation with step-by-step execution and screenshots
- LinkedIn: link